founded 2015
“I like to explain having a TAM as another resource to get you where you need to go. Jerry is kind of like our own Siri or Alexa. All it takes is a simple prompt like, 'Hey? We need this.' and Jerry is there to make it happen.”
LogicGate Risk Cloud is an enterprise GRC automation platform that enables organizations to build agile risk management programs. The no-code platform transforms how businesses manage risk, compliance, and third-party risk through configurable workflows and real-time reporting.
LogicGate Risk Cloud is widely praised for its no-code configurability, allowing risk and compliance teams to build custom workflows without developer involvement. Enterprise users appreciate the platform's flexibility and real-time dashboards, though some note the initial implementation can be resource-intensive and pricing is geared toward larger organizations.
Showing 4 of 8. The rest are locked.
4 references
We initially focused on formalizing our vendor risk, policy, and business continuity management programs by adopting Risk Cloud, as the majority of our NCUA findings were within one of those three domains. Our biggest challenge before implementing Risk Cloud was a lack of process governance and actionable insights to guide our team's priorities. The following year, those same programs had zero exam findings.
I like to explain having a TAM as another resource to get you where you need to go. Jerry is kind of like our own Siri or Alexa. All it takes is a simple prompt like, 'Hey? We need this.' and Jerry is there to make it happen.
I just asked him for advice last week, 'How do your other customers do this? Or how did you do this at your financial institution before you came to LogicGate?' Even if Jerry doesn't have the answer to a question, he's great about reaching out to other TAMs or folks in his network to bring that additional perspective and say, 'You might want to consider doing it this way instead.'
Jerry has the technical ability to translate what we're looking for into technical requirements and then turn them into something tangible. Sometimes we aren't even one hundred percent sure what we're looking for, we might only have a concept of what we need. We know we can count on Jerry to get us where we need to go.
Dignity
4 references · Locked
4 more quotes from 1 company locked
Claim this listing and upgrade to unlock the rest.
No case studies yet
We haven't harvested any public case studies for LogicGate yet. Are you the vendor? Claim this listing to add documented customer outcomes.
3 plans available.
Be the first to write a community review of LogicGate.
Write a review
Share your experience with LogicGate and help others make informed decisions.
Compliance automation for cloud-first companies
79 customer references
Enterprise password and secrets management with compliance
26 customer references
Continuous compliance automation with 85+ integrations
119 customer references
Cloud security platform with compliance capabilities
1 customer reference
Compliance operating system for modern enterprises
21 customer references
Automated compliance for SOC 2, HIPAA, ISO 27001 & more
70 customer references
What Is SOC 2? A Complete Guide to SOC 2 Compliance
SOC 2 is a security framework developed by the AICPA that defines criteria for managing customer data based on five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.
SOC 2 Type I vs Type II: Key Differences Explained
SOC 2 Type I evaluates whether your security controls are properly designed at a single point in time, while Type II tests whether those controls actually operated effectively over a period of 3-12 months.
What Is HIPAA? A Complete Guide to HIPAA Compliance
HIPAA (Health Insurance Portability and Accountability Act) is a US federal law that sets national standards for protecting sensitive patient health information (PHI) from being disclosed without the patient's consent or knowledge.
HIPAA Compliance Checklist for 2025
A comprehensive HIPAA compliance checklist covers risk assessments, administrative/physical/technical safeguards, Business Associate Agreements, workforce training, breach notification procedures, and ongoing documentation requirements.